Now more arrests are pouring in. A 23-year-old Phoenix, Arizona
native, Cody Andrew Kretsinger, has been arrested ("recursion").
You may recall that recursion showed up at numerous times in LulzSec's chat
logs during the attacks [1][2][3] on Sony Corp. (TYO:6758), but quit the group in
June [source] as it stepped up attacks on the U.S.
government. Recursion reportedly was a relatively novice hacker relying
heavily on SQL injection, a technique frowned upon by more sophisticated
hackers.

Police in the UK last month also arrested 5 men ages 16 to 26 who
allegedly together managed LulzSec chief Kayla's online
identity. Kayla claimed to be "a 16 year-old girl."
LulzSec/Anonymous chief Sabu confirms that Kayla has
been arrested, though he/she has not verified that the UK authorities theory of
multiple users' involvement is true.

According to Sabu, he and one other LulzSec member
are the only ones walking free. Topiary, Kayla, Recursion, Tflow, Pwnsauce,
and Palladium have all been arrested. The other
remaining free member appears to be Avunit, who was not a founding
member, but participated in many of the group's key attacks.

Of course LulzSec was only a particularly bold subclan of the
greater hacking collective Anonymous, who lives on via its thousands of
members. But active attackers within Anonymous have been
hit with recent arrests as well. Christopher Doyon, 47, of Mountain View,
California, and Joshua Covelli, 26, of Fairborn, Ohio, allegedly members of Anonymous subclan People's
Liberation Front, were arrested this week for allegedly
orchestrating a distributed denial of service attack on the county of Santa
Cruz, California back in 2010.

Anonymous isn't willing to go down without a fight, though.
Despite the recent arrests, members like Sabu remain
defiant. They have planned a "Day of Vengeance" on various
parties in New York City in response to crackdowns on Wall Street protesters.
In a note for the group-without-a-leader writes,
"... Anonymous and other cyber liberation groups will launch a series of
cyber attacks against various targets including Wall Street, Corrupt Banking
Institutions - and the NYC Police Department."

Comments

Threshold

Username

Password

remember me

This article is over a month old, voting and posting comments is disabled

You can't hide your location on a communications network that has every single bit duplicated and mirrored to government systems, silly. Only the amount of desire they have to catch you determines their level of pursuit.

Unless you're dynamically altering everything on your system (all hardware and software identifiables) with every connection and accessing from random physical locations there's no hiding from the eyes that see all.

He isn't a paranoid, it's real. The government are using systems near ''Echelon IV'' from the DeusEx Game. There is no escape once you're on the electronic trace. And there is no way of using alternate protocols once everything is mounted on top of IPV4/IPV6 nowadays. There is source and destination, simple as that. Even with such a decentralized way of comunicating with nearby systems that aren't exactly traceable by other country authorities, people that uses proprietary software normally will never know if their computers are sending discrete signals to some destination whereas identifiable information can be found, obviously, those guys uses technologies like wireshark to determine ''ins and outs'' of their computers to avoid be caugh, but once you dispare discrete signals to a tree of bots, some reversible information are stored in routers that could lead authorities to you. Ok, you can travel a lot, and send discrete signals to bots from where you are, but in fact, again, you will need a source and destination in order to those services get alive and active, then you have to send discrete alive signals from those infected machines to a destination, you can have lot's of destination for a botnet, but you will again need a source and destination, some uses domains to it ( those are being killed sistematically by giants like Microsoft and Governments )But I can tell you one thing that is far more dangerous to be caugh working in an extensive botnet ( in fact, it's hard to be caugh once you have an extense range of Ips serving you...)

1) encryption. It does scramble the message, but does nothing to hide, say, IP headers. The guy you're replying to kept talking about "source and destination". Encryption does nothing to obfuscate that. If you are LulzSec (or whatever) then you were trying to hide your true location. Otherwise you eventually get a knock on the door (if you're lucky).

2) onion routing. Effective but not guaranteed. Even something like TAILShttps://tails.boum.org/states upfront that TOR really isn't designed to defeat a global adversary. Umm, I think if you F*** with the CIA I suspect you will have just that kind of adversary.

There are other protocols in R&D that are specifically designed to make traffic analysis quite difficult. Haven't heard of anything that works reasonably well [i.e. like TAILS over the Internet, only better].

Lastly, given that LulzSec has been quiet as a mouse lately, I suspect that Eschelon is real.

Or were you deliberately being Orwellian by using "paranoid" to actually mean aware of realities of persecution? On that same doublespeak note, we've redefined whistleblowing to now mean of treason or terrorism.

Frank Blaco, former head of the NSA:"Movies like Enemy of the State make those of us in the intelligence community laugh. They make us look omniscient, like we can collect anything we want, see anything we want. It's just not that way."